通信学报 ›› 2023, Vol. 44 ›› Issue (10): 34-45.doi: 10.11959/j.issn.1000-436x.2023185
• 学术论文 • 上一篇
王苗苗, 芮兰兰, 徐思雅
修回日期:
2023-08-18
出版日期:
2023-10-01
发布日期:
2023-10-01
作者简介:
王苗苗(1989− ),女,河北廊坊人,北京邮电大学博士生,主要研究方向为区块链、信息安全等基金资助:
Miaomiao WANG, Lanlan RUI, Siya XU
Revised:
2023-08-18
Online:
2023-10-01
Published:
2023-10-01
Supported by:
摘要:
为解决传统单因子认证造成的数据泄露和身份冒充等问题,针对文化资源可信共享提出基于区块链的多因子身份认证方案。考虑多种身份因素,利用区块链分布式账本的不可篡改性和分布性构造异构数字身份模型。通过非对称加密算法和异或运算,实现异构数字身份的可信复用和多元主体的快速认证。安全分析和仿真结果表明,所提方案在安全性和效率方面优于已有的多因子认证方案,能有效降低身份认证成本。
中图分类号:
王苗苗, 芮兰兰, 徐思雅. 面向文化资源可信共享的多因子身份认证方案[J]. 通信学报, 2023, 44(10): 34-45.
Miaomiao WANG, Lanlan RUI, Siya XU. Multi-factor identity authentication scheme for trusted sharing of cultural resources[J]. Journal on Communications, 2023, 44(10): 34-45.
[1] | 中国公共关系协会. 文化资源数据分类与代码:T/CPRA 301—2021[S]. 2021. |
China Public Relations Association. Classification & codes of cultural resource data:T/CPRA 301—2021[S]. 2021. | |
[2] | CHEN L Q , LIM H W , YANG G M . Cross-domain password-based authenticated key exchange revisited[J]. ACM Transactions on Information and System Security, 2014,16(4): 1-32. |
[3] | ALSALEEM B O , ALSHOSHAN A I . Multi-factor authentication to systems login[C]// Proceedings of 2021 National Computing Colleges Conference (NCCC). Piscataway:IEEE Press, 2021: 1-4. |
[4] | ELIZABETH , KENNEDY , CHRISTOPHER ,et al. Data security and multi-factor authentication:analysis of requirements under EU law and in selected EU member states[J]. Computer Law & Security Review, 2016,32(1): 91-110. |
[5] | 唐飞, 包佳立, 黄永洪 ,等. 基于属性的多授权中心身份认证方案[J]. 通信学报, 2021,42(3): 220-228. |
TANG F , BAO J L , HUANG Y H ,et al. Multi-authority attribute-based identification scheme[J]. Journal on Communications, 2021,42(3): 220-228. | |
[6] | ALFADHLI S A , LU S F , CHEN K ,et al. MFSPV:a multi-factor secured and lightweight privacy-preserving authentication scheme for VANETs[J]. IEEE Access, 2020,8: 142858-142874. |
[7] | LIU Y , ZHONG Q , CHANG L ,et al. A secure data backup scheme using multi-factor authentication[J]. IET Information Security, 2016,11(5): 250-255. |
[8] | 王松伟, 陈建华 . 基于混沌映射的多因子认证密钥协商协议[J]. 计算机应用, 2018,38(10): 2940-2944,2954. |
WANG S W , CHEN J H . Multi-factor authentication key agreement scheme based on chaotic mapping[J]. Journal of Computer Applications, 2018,38(10): 2940-2944,2954. | |
[9] | WANG M M , RUI L L , YANG Y ,et al. A blockchain-based multi-CA cross-domain authentication scheme in decentralized autonomous network[J]. IEEE Transactions on Network and Service Management, 2022,19(3): 2664-2676. |
[10] | NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system[R]. 2008. |
[11] | ZHANG R , XUE R , LIU L . Security and privacy on blockchain[J]. ACM Computing Surveys, 2019,52(3): 1-34. |
[12] | MONRAT A A , SCHELéN O , ANDERSSON K . A survey of blockchain from the perspectives of applications,challenges,and opportunities[J]. IEEE Access, 2019,7: 117134-117151. |
[13] | DODIS Y , REYZIN L , SMITH A . Fuzzy extractors:how to generate strong keys from biometrics and other noisy data[C]// Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2004: 523-540. |
[14] | 翁启 . 一种基于区块链的数字身份认证方案[D]. 西安:西安电子科技大学, 2019. |
WENG Q . A blockchain-based digital identity authentication scheme[D]. Xi’an:Xidian University, 2019. | |
[15] | DOLEV D , YAO A . On the security of public key protocols[J]. IEEE Transactions on Information Theory, 1983,29(2): 198-208. |
[16] | CANETTI R , FULLER B , PANETH O ,et al. Reusable fuzzy extractors for low-entropy distributions[J]. Journal of Cryptology, 2021,34: 1-33. |
[17] | BURROWS M , ABADI M , NEEDHAM R . A logic of authentication[J]. ACM Transactions on Computer Systems, 1989,8(1): 18-36. |
[18] | LABIOD Y , KORBA A A , GHOUALMI-ZINE N . Detecting DDoS attacks in IoT environment[J]. International Journal of Information Security and Privacy, 2021,15(2): 145-180. |
[19] | YU B , LI X F , ZHAO H . Virtual block group:a scalable blockchain model with partial node storage and distributed hash table[J]. The Computer Journal, 2020,63(10): 1524-1536. |
[20] | 赵国威 . 安全协议形式化自动验证工具 AVISPA 的研究[D]. 长春:吉林大学, 2014. |
ZHAO G W . Research on AVISPA,a formal automatic verification tool for security protocols[D]. Changchun:Jilin University, 2014. | |
[21] | MAHMOOD K , AKRAM W , SHAFIQ A ,et al. An enhanced and provably secure multi-factor authentication scheme for Internet-of-multimedia-things environments[J]. Computers & Electrical Engineering, 2020,88:106888. |
[22] | AYFAA B , APA C . LMAAS-IoT:lightweight multi-factor authentication and authorization scheme for real-time data access in IoT cloud-based environment[J]. Journal of Network and Computer Applications, 2021,192:103177. |
[23] | KHALID H , HASHIM S J , AHMAD S M S ,et al. SELAMAT:a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems[J]. Sensors, 2021,21(4): 1428. |
[24] | MIAO J , WANG Z , NING X ,et al. Practical and secure multifactor authentication protocol for autonomous vehicles in 5G[J]. Software:Practice and Experience, 2022:doi.org/10.1002/spe.3087. |
[25] | 张敏, 许春香, 张建华 . 无人机网络中基于多因子的认证密钥协商协议研究[J]. 信息网络安全, 2022(9): 21-30. |
ZHANG M , XU C X , ZHANG J H . Research on authentication key agreement protocol based on multi-factor in Internet of drones[J]. Netinfo Security, 2022(9): 21-30. |
[1] | 李致远, 徐丙磊, 周颖仪. 基于图神经网络的账户余额模型区块链地址分类方法[J]. 通信学报, 2023, 44(9): 115-126. |
[2] | 陈越, 郝增航, 魏江宏, 胡学先, 杨冬梅. 支持陷门撤销和编辑次数限制的可编辑区块链[J]. 通信学报, 2023, 44(7): 100-113. |
[3] | 冯涛, 陈李秋, 方君丽, 石建明. 基于本地化差分隐私和属性基可搜索加密的区块链数据共享方案[J]. 通信学报, 2023, 44(5): 224-233. |
[4] | 刘雪娇, 钟强, 夏莹杰. 基于双层分片区块链的车联网跨信任域高效认证方案[J]. 通信学报, 2023, 44(5): 213-223. |
[5] | 张海波, 曹钰坤, 刘开健, 王汝言. 车联网中基于区块链的分布式信任管理方案[J]. 通信学报, 2023, 44(5): 148-157. |
[6] | 夏莹杰, 朱思雨, 刘雪娇. 区块链架构下具有条件隐私的车辆编队跨信任域高效群组认证研究[J]. 通信学报, 2023, 44(4): 111-123. |
[7] | 刘雪娇, 曹天聪, 夏莹杰. 区块链架构下高效的车联网跨域数据安全共享研究[J]. 通信学报, 2023, 44(3): 186-197. |
[8] | 经普杰, 王良民, 董学文, 张玉书, 王骞, Muhammad Sohail. 分层跨链结构:一种面向区块链系统监管的可行架构[J]. 通信学报, 2023, 44(3): 93-104. |
[9] | 戴千一, 张斌, 郭松, 徐开勇. 基于多分类器集成的区块链网络层异常流量检测方法[J]. 通信学报, 2023, 44(3): 66-80. |
[10] | 蒋丽, 谢胜利, 田辉. 面向数字孪生边缘网络的区块链分片及资源自适应优化机制[J]. 通信学报, 2023, 44(3): 12-23. |
[11] | 黄冬艳, 李琨. 多地址的时间型区块链隐蔽通信方法研究[J]. 通信学报, 2023, 44(2): 148-159. |
[12] | 李雷孝, 杜金泽, 林浩, 高昊昱, 杨艳艳, 高静. 区块链网络隐蔽信道研究进展[J]. 通信学报, 2022, 43(9): 209-223. |
[13] | 冯霞, 崔凯平, 谢晴晴, 王良民. VANET中基于区块链的分布式匿名认证方案[J]. 通信学报, 2022, 43(9): 134-147. |
[14] | 杨亚涛, 刘德莉, 刘培鹤, 曾萍, 肖嵩. BFV-Blockchainvoting:支持BFV全同态加密的区块链电子投票系统[J]. 通信学报, 2022, 43(9): 100-111. |
[15] | 熊礼治, 朱蓉, 付章杰. 基于交易构造和转发机制的区块链网络隐蔽通信方法[J]. 通信学报, 2022, 43(8): 176-187. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|